GlassWorm Campaign Uses 72 Malicious Open VSX Extensions to Broaden Reach
the GlassWorm malware campaign has evolved to infect developer environments using transitive dependencies. On March 13, 2026, the Socket Research Team reported identifying at least 72 new malicious Open VSX extensions linked
Instead of placing the malicious payload directly into an initial extension, threat actors are now disguising the malware by pulling it through secondary updates after trust is established.
The core of this new technique relies on abusing two legitimate extension manifest fields: extensionPack and extensionDependencies. These features are originally designed to help developers conveniently bundle required extensions together.
However, GlassWorm operators are publishing seemingly benign, standalone extensions to the Open VSX registry first.
According to Socket Research Team, once developers install and trust these extensions, the attackers release a later update that modifies the manifest files.
This update secretly introduces an extensionPack or extensionDependencies link to a separate, hidden GlassWorm loader.
As a result, the code editor automatically installs the malicious dependency in the background, making standard initial code reviews completely ineffective.
twilkbilk.color-highlight-css Open VSX extension (Source: Socket)To maximize their reach, the attackers heavily impersonate popular developer utilities and inflate download counts into the thousands.
The 72 malicious packages mimic widely used linters, code formatters like Prettier and ESLint, and popular language tooling for Python, Vue, Angular, and Flutter.
Notably, the campaign also targets developers using artificial intelligence tools. Threat actors have created extensions impersonating AI developer assistants like Claude Code, Codex, and Antigravity.
In some instances, such as the daeumer-web.es-linter-for-vs-code package, attackers used direct typosquatting of legitimate publisher names to appear trustworthy and trick unsuspecting victims.
While GlassWorm maintains its primary goal of stealing local credentials, configuration data, and environment secrets from developer workstations, the malware itself has grown more resilient.
The latest variants demonstrate several advanced technical capabilities:
Because these malicious packages appear completely benign upon initial publication, development teams must adjust their security practices.
Reviewing the code of an extension at its first release is no longer enough to guarantee safety.
To protect your environments against transitive GlassWorm infections, implement the following mitigations:
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post GlassWorm Campaign Uses 72 Malicious Open VSX Extensions to Broaden Reach appeared first on Cyber Security News.
Microsoft has announced a two-phase plan to disable the hands-free deployment feature in Windows Deployment…
Full spoilers follow for Primal Season 3, Episode 10, “An Echo of Eternity,” which is…
The year is 2033, and a devastating virus and rogue AI have combined to bring…
The year is 2033, and a devastating virus and rogue AI have combined to bring…
The Oscars just had their seventh tie in the history of the Academy Awards, for…
A sign explaining restrictions on buying soda and sweetened drinks using Supplemental Nutrition Assistance Program…
This website uses cookies.